der OnleiheVerbundHessen. Todos los títulos sobre Shore, Malcolm

Seitenbereiche:


Editar filtro


título 1-20 de 24


Shore, Malcolm

Rapid Application Development with Python

Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Understanding Zero Trust

The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Migrating COBOL Apps

Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Learning Kali Linux

Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: Enumeration

Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Penetration Testing Essential Training

You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Python: Pen Testing AWS

Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Cybersecurity with Cloud Computing

More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Learning Assembly Language

In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Using SABSA to Architect Cloud Security

The security required for cloud deployments is quite different from the security applied to on-site  ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: Denial of Service

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Cybersecurity for IT Professionals

Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Cybersecurity Foundations

Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Penetration Testing: Advanced Kali Linux

Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: Session Hijacking

One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: Enumeration (2019)

Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Penetration Testing: Advanced Enumeration

Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: Hacking Web Servers and Web Applications

Websites and web applications are-by their very nature-accessible remotely, which puts them at high  ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Penetration Testing: Advanced Tunneling and Exfiltration

Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...

en la colección desde: 20.05.2021

disponible

Shore, Malcolm

Ethical Hacking: The Complete Malware Analysis Process

The key to effectively protecting your systems is understanding the attacks you have to defend them  ...

en la colección desde: 20.05.2021

disponible